{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T06:28:36Z","timestamp":1773988116063,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T00:00:00Z","timestamp":1531699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,16]]},"DOI":"10.1145\/3236454.3236512","type":"proceedings-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T18:39:17Z","timestamp":1546972757000},"page":"138-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Electromagnetic side-channel attacks"],"prefix":"10.1145","author":[{"given":"Asanka","family":"Sayakkara","sequence":"first","affiliation":[{"name":"University College Dublin, Ireland"}]},{"given":"Nhien-An","family":"Le-Khac","sequence":"additional","affiliation":[{"name":"University College Dublin, Ireland"}]},{"given":"Mark","family":"Scanlon","sequence":"additional","affiliation":[{"name":"University College Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2018,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2013.6637558"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Vasudev Bhaskaran and Konstantinos Konstantinides. 1997. Image and video compression standards: algorithms and architectures. Vol. 408. Springer Science & Business Media.   Vasudev Bhaskaran and Konstantinos Konstantinides. 1997. Image and video compression standards: algorithms and architectures. Vol. 408. Springer Science & Business Media.","DOI":"10.1007\/978-1-4615-6199-6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931065"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.39"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067738"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2014.7045829"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS","author":"Du Xiaoyu","year":"2017"},{"key":"e_1_3_2_1_10_1","unstructured":"Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996).  Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996)."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security Symposium. 849--864","author":"Guri Mordechai","year":"2015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.43"},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Cryptology (CRYPTO '99)","author":"Kocher Paul"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_10"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design (COSADE). Schindler and Huss, 29--41","author":"Lerman Liran","year":"2011"},{"key":"e_1_3_2_1_17_1","volume-title":"Current Challenges and Future Research Areas for Digital Forensic Investigation. In The 11th ADFSL Conference on Digital Forensics, Security and Law (CDFSL","author":"Lillis David","year":"2016"},{"key":"e_1_3_2_1_18_1","article-title":"Hierarchical Bloom Filter Trees for Approximate Matching","volume":"13","author":"Lillis David","year":"2018","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_1_19_1","volume-title":"Mobility and Security (NTMS), 2018 9th IFIP International Conference on. IEEE, 1--5.","author":"MacDermott Aine","year":"2018"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080223"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31271-2_8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic Analysis (EMA): Measures and counter-measures for smart cards. Smart Card Programming and Security (2001) 200--210.   Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic Analysis (EMA): Measures and counter-measures for smart cards. Smart Card Programming and Security (2001) 200--210.","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/789083.1022709"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3234690"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.003"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2940650"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2017.8167885"},{"key":"e_1_3_2_1_30_1","volume-title":"Comparison of Radio Frequency Based Techniques for Device Discrimination and Operation Identification. In 11th International Conference on Cyber Warfare and Security: ICCWS2016","author":"Stone Barron","year":"2016"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Walter HW Tuttlebee. 2003. Software defined radio: enabling technologies. John Wiley & Sons.  Walter HW Tuttlebee. 2003. Software defined radio: enabling technologies. John Wiley & Sons.","DOI":"10.1002\/0470867728"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/15614263.2015.1128163"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138830"},{"key":"e_1_3_2_1_35_1","volume-title":"RSA Conference","volume":"2008","author":"Witteman Marc","year":"2008"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Marc F Witteman Jasper GJ van Woudenberg and Federico Menarini. 2011. Defeating RSA Multiply-Always and Message Blinding Countermeasures. In Cryptographersfi Track at the RSA Conference (CT-RSA) Vol. 6558. Springer 77--88.   Marc F Witteman Jasper GJ van Woudenberg and Federico Menarini. 2011. Defeating RSA Multiply-Always and Message Blinding Countermeasures. In Cryptographersfi Track at the RSA Conference (CT-RSA) Vol. 6558. Springer 77--88.","DOI":"10.1007\/978-3-642-19074-2_6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130984"}],"event":{"name":"ISSTA '18: International Symposium on Software Testing and Analysis","location":"Amsterdam Netherlands","acronym":"ISSTA '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Companion Proceedings for the ISSTA\/ECOOP 2018 Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236454.3236512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236454.3236512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:40Z","timestamp":1750210780000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236454.3236512"}},"subtitle":["potential for progressing hindered digital forensic analysis"],"short-title":[],"issued":{"date-parts":[[2018,7,16]]},"references-count":36,"alternative-id":["10.1145\/3236454.3236512","10.1145\/3236454"],"URL":"https:\/\/doi.org\/10.1145\/3236454.3236512","relation":{},"subject":[],"published":{"date-parts":[[2018,7,16]]},"assertion":[{"value":"2018-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}